02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Assessment Test xxxiii<br />

19. An individual presents herself at your office claiming to be a service technician. She is<br />

attempting to discuss technical details of your environment such as applications, hardware,<br />

and personnel used to manage it. This may be an example of what type of attack?<br />

A. Social engineering<br />

B. Access control<br />

C. Perimeter screening<br />

D. Behavioral engineering<br />

20. Which of the following is a major security problem with the FTP protocol?<br />

A. Password files are stored in an unsecure area on disk.<br />

B. Memory traces can corrupt file access.<br />

C. User IDs and passwords are unencrypted.<br />

D. FTP sites are unregistered.<br />

21. Which system would you install to provide detective capabilities within a network?<br />

A. NIDS<br />

B. HIDS<br />

C. NIPS<br />

D. HIPS<br />

22. The process of maintaining the integrity of evidence and ensuring no gaps in possession<br />

occur is known as?<br />

A. Security investigation<br />

B. Chain of custody<br />

C. Three A’s of investigation<br />

D. Security policy<br />

23. What encryption process uses one piece of information as a carrier for another?<br />

A. Steganography<br />

B. Hashing<br />

C. MDA<br />

D. Cryptointelligence<br />

24. Which policy dictates how assets can be used by employees of a company?<br />

A. Security policy<br />

B. User policy<br />

C. Use policy<br />

D. Enforcement policy<br />

E. Acceptable use policy

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!